Sec+ Quiz - 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 34+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 2 pts
An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).
The hashing method
The encryption method
The registration authority
The certificate authority
The back-end directory source
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
On-path
Domain hijacking
DNS poisoning
Evil twin
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?
Netstat
Ping
ssh
Ipconfig
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?
Lessons learned
Preparation
Detection
Containment
Root cause analysis
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?
Check the hash of the installation file
Match the file names
Verify the URL download location
Verify the code-signing certificate
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Embedded Python code
Macro-enabled file
Bash scripting
Credential-harvesting website
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?
Snapshot
Differential
Cloud
Full
Incremental
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Sec+ Quiz - 3

Quiz
•
Professional Development
15 questions
CloudBinary_Apache_Tomcat_Quiz- 2

Quiz
•
Professional Development
20 questions
SOAL ULANGAN ASJ KELAS XII TKJ

Quiz
•
Professional Development
10 questions
Linux

Quiz
•
Professional Development
10 questions
KSK2023 - 2

Quiz
•
Professional Development
10 questions
Kubernetes Quiz

Quiz
•
Professional Development
11 questions
JavaScript

Quiz
•
Professional Development
20 questions
101-120

Quiz
•
Professional Development
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade